Abstract
VoLTE is a technology carried on 4G network by RTP, and realizes the unification of data and voice communication. At the same time, it also faces the vulnerability of wireless communication. This paper proposes a HOOK-based method to modify the mobile phone baseband to implement end-to-end encrypted VoLTE calls. The experiment first builds a framework with assembly code, which can hook the process functions for sending and receiving packet, in order to capture the RTP data packet and inject the encryption and decryption patch function. Then through the analysis of the data packet, the key agreement and extension using the packet header is completed by C language. The automatic voice data encryption with AES 256 algorithm is realized through the library functions in the baseband. In conclusion, the experiment implements a one-time pad encryption mechanism to ensure VoLTE communication security, so that even if a third party intercepts the data packet, the information cannot be leaked.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mohseni, M., Banani, S.A., Eckford, A.W., Adve, R.S.: Scheduling for VoLTE: resource allocation optimization and low-complexity algorithms. IEEE Trans. Wireless Commun. 18(3), 1534–1547 (2019)
Zhang, X.Y., Gao, S.Q., Jiang, H.J.: Baseband circuit design for wireless speech acquisition transmitter based on G.726 coding. Microelectron. Comput. 35(1), 31–35, 40 (2018)
Dick, S., Volmar, D.: DLL hell: software dependencies, failure, and the maintenance of microsoft windows. IEEE Ann. Hist. Comput. 40(4), 28–51 (2018)
Shin, K., Won, Y.: Study on malicious code behavior detection using windows filter driver and API call sequence. In: Park, James J., Loia, V., Yi, G., Sung, Y. (eds.) CUTE/CSA -2017. LNEE, vol. 474, pp. 938–943. Springer, Singapore (2018). https://doi.org/10.1007/978-981-10-7605-3_149
Zhan, D.Y., Ye, L., Zhang, H.L.: A high-performance virtual machine filesystem monitor in cloud-assisted cognitive loT. Futur. Gener. Comput. Syst. Int. J. Escience 88, 209–219 (2018)
Natarajan, H., Diggi, S., Kanagarathinam, MR.: D-VoWiFi - a guaranteed bit rate scheduling for VoWiFi in non dedicated channel. In: 16th IEEE Annual Consumer Communications and Networking Conference (CCNC), pp. 1–6. IEEE, Las Vegas, NV (2019)
Sung, Y.C., Ho, Y.S., Lin, Y.B.: Voice/Video quality measurement for LTE services. IEEE Wirel. Commun. 25(4), 96–103 (2018)
Yang, H.J., Shi, M., Xia, Y.Q.: Security research on wireless networked control systems subject to jamming attacks. IEEE Trans. Cybern. 49(6), 2022–2031 (2019)
Kim, H., Kim, D., Kwon, M.: Breaking and fixing VoLTE: exploiting hidden data channels and mis-implementations. In: 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 328–339. Assoc Comp Machinery, Denver, CO (2015)
Zhang, X.S., Tan, Y.A., Liang, C., Li, Y.Z.: A covert channel over VoLTE via adjusting silence periods. IEEE Access 6, 9292–9302 (2018)
Li, C.Y., Tu, G.H., Peng, C.Y.: Insecurity of voice solution VoLTE in LTE mobile networks. In: 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 316–327. Assoc Comp Machinery, Denver, CO (2015)
Tu, G.H., Li, C.Y., Peng, C.Y.: How voice call technology poses security threats in 4G LTE networks. In: 2015 IEEE Conference on Communications and Network Security (CNS), pp. 442–450. Springer, Florence, Italy (2015)
Fan, A.W., Wang, Q.M., Debnath, J.: A high precision data encryption algorithm in wireless network mobile communication. Discret. Continuous Dyn. Syst.-S 12(4–5), 1327–1340 (2019)
Kfoury, E.F., Khoury, D.J.: Secure end-to-end VoLTE based on ethereum blockchain. In: 41st International Conference on Telecommunications and Signal Processing (TSP), pp. 128–132. IEEE, Athens, Greece (2018)
Zhang, Q.X., Gong, H.X., Zhang, X.S.: A sensitive network jitter measurement for covert timing channels over interactive traffic. Multimed. Tools Appl. 78(3), 3493–3509 (2019)
Zhao, M., Jia, B., Wang, J.: Performance optimization on dynamic adaptive streaming over HTTP in multi-user MIMO LTE networks. IEEE Trans. Mob. Comput. 17(12), 2853–2867 (2018)
Li, J., Hao, Z.h., Gao, Q.: Implementation of a multimedia communication system over IP network. In: IEEE 2nd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), pp. 141–145. IEEE, Chengdu, Peoples of China (2017)
Wenger, S.: H.264/AVC over IP. IEEE Trans. Circuits Syst. Video Technol. 13(7), 645–656 (2003)
Bachtiar, M., Wasista, S., Ditanaya, T.: Security enhancement of AES based encryption using dynamic salt algorithm. In: International Conference on Applied Engineering (ICAE). IEEE, Batam, Indonesia (2018)
Rao, M., Kaknjo, A., Omerdic, E.: An efficient high speed AES implementation using traditional FPGA and LabVIEW FPGA platforms. In: 10th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), pp. 93–100. IEEE, Zhengzhou, Peoples of China (2018)
Long, X., Wang, J., Zhao, G.: Forward security research of key management scheme in wireless sensor networks. Comput. Eng. Appl. 47(25), 68–70, 88, 136 (2011)
Ahmed, A.A., Ali, W.: A lightweight reliability mechanism proposed for datagram congestion control protocol over wireless multimedia sensor networks. Trans. Emerg. Telecommun. Technol. 29(3), 1–17 (2018)
Acknowledgment
This work is supported by National Natural Science Foundation of China (No. 61876019 & U1636213).
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Wang, Y., Han, W., Wang, L., Liu, L., Yu, X. (2019). Encrypting VoLTE Communication via Baseband Firmware Extension. In: Vaidya, J., Zhang, X., Li, J. (eds) Cyberspace Safety and Security. CSS 2019. Lecture Notes in Computer Science(), vol 11982. Springer, Cham. https://doi.org/10.1007/978-3-030-37337-5_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-37337-5_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-37336-8
Online ISBN: 978-3-030-37337-5
eBook Packages: Computer ScienceComputer Science (R0)